Google Play Has Apps Abusing Master Key Vulnerability

Two apps currently available for download in Google Play abuse the critical master key vulnerability that affects almost all Android devices. Is Google reviewing apps for the flaw?

9 Android Apps To Improve Security, Privacy

(click image for larger view)

Google Play alert: An information security researcher has spotted two apps that use the master key vulnerability that's present in an estimated 99% of all Android devices. But rather than being distributed by sketchy third-party app stores, which are known for harboring malicious apps that have been disguised as free versions of the real thing, these two apps are available directly from the official Google Play app store.

Fortunately, the apps don't appear to be malicious. But the presence of the free apps -- Rose Wedding Cake Game and Pirates Island Mahjong Free, which have been downloaded by between 15,000 and 60,000 people -- on the Google Play site calls into question whether Google is now scanning for apps that abuse the so-called master key vulnerability that was discovered by Bluebox Labs in February and detailed by Android hackers earlier this month, as well as a similar vulnerability that was disclosed last week by researchers at Android Security Squad in China.

"We always advise people to stick to applications that are delivered via Google Play," said Bogdan Botezatu, the senior e-threat analyst at BitDefender who discovered the apps, speaking by phone. "But we just saw applications manifesting this behavior on Google Play. So what do I advise my users and readers?"

In the meantime, he's notified Google about the apps and emphasized that "they do not pose a threat for users." In addition, he said, "We also notified the developers because at the moment we do not know if this is a voluntary behavior or if this is a side effect of them using a specific software development toolkit," which in this case was Adobe AIR. It's also possible that a simple coding mistake is to blame for the apps sporting two duplicate PNG files with the same name and extension being located in the same folder. "This is not a good practice, because the file system was not designed in such a way to allow two files with the same names and the same extension to be in the same folder -- it's going to lead to confusion," said Botezatu.

Regardless, the apps won't be allowed to execute by the latest version of Android, or if users have installed antivirus or security software designed to block the master key exploit.

But given that Google was first alerted to the vulnerability in February, it's curious that its automated Bouncer application security checks didn't intercept the apps, which were last updated in mid-May and mid-June. "I'm not sure if Google Play didn't flag these applications as malicious because they didn't have malicious behavior, or if they weren't able to scan these applications for the vulnerability in Google Play," Botezatu said.

A Google spokesman didn't immediately respond to an emailed request for comment about the apps, or whether Google is now actively scanning all apps to detect if they appear to exploit the vulnerability.

From a patch standpoint, Android quickly patched the master key vulnerability in the Android Open Source Project (AOSP) after learning of the vulnerability in February, and some recently released devices -- Samsung Galaxy S4 and HTC One devices running Android 4.2.2 or above -- have a related patch. Likewise, the developers behind the third-party Android firmware CyanogenMod have updated their firmware with patches for the master key vulnerability identified by Bluebox Labs, as well as the more recent vulnerability identified by Android Security Squad.

How can other Android users protect themselves against the vulnerability? The easiest approach is to use an Android antivirus app that's been updated to block any apps that attempt to exploit the vulnerability, and both BitDefender and Webroot updated their Android antivirus software Tuesday, with Botezatu noting that BitDefender's software also includes a patch for the flaw spotted by Android Security Squad. Alternately, more advanced Android users can install ReKey from Duo Security, which will patch the vulnerability, but only on rooted devices.

Unfortunately, however, the majority of Android may have to wait months -- if ever -- to see a related operating system update for their device from their handset maker or carrier. "The thing is, not for users of Cyanogenmod, but rather who are part of the huge ecosystem that's Android 2.3.3 Gingerbread [or earlier], they are highly unlikely to receive any security updates from carriers," said BitDefender's Botezatu. "That's why we rushed the fix for our antivirus, because everyone can install an antivirus, but not everyone can upgrade their device. It's difficult for a regular user to root their phone and install a third-party ROM."

Thumbs up for Google. Finally a big company is looking in some issues that concerns many android phone users. It took a while but maybe this is the beginning of some cleanup that had to be done inside the android market.

Published: 2015-03-03Off-by-one error in the ecryptfs_decode_from_filename function in fs/ecryptfs/crypto.c in the eCryptfs subsystem in the Linux kernel before 3.18.2 allows local users to cause a denial of service (buffer overflow and system crash) or possibly gain privileges via a crafted filename.

Published: 2015-03-03** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue in customer-controlled software. Notes: none.

How can security professionals better engage with their peers, both in person and online? In this Dark Reading Radio show, we will talk to leaders at some of the security industry’s professional organizations about how security pros can get more involved – with their colleagues in the same industry, with their peers in other industries, and with the IT security community as a whole.